Feeds

1.3 million phones found down back of the sofa in UK

Although not all in the same one, obviously

Top 5 reasons to deploy VMware with Tegile

More than half of mobiles reported stolen in the UK later turn up down the back of the sofa or somewhere similar, according to the UK Home Office.

Last week we asked the Home Office what happens to the 1.3 million handsets that they had told us were reported stolen, but don't appear in the official crime figures. Now we know - they turn up later, safe and sound.

The figures came in response to our coverage of the latest schemes to reduce mobile-phone crime, which were sponsored by The Technology Strategy Board*. They included a tag which bleeps if your handset is more than a few meters away, and a system that requests a PIN when the SIM is changed.

Those ideas were promoted with the information that 228 phones are reported stolen every hour in the UK, which adds up to around 2m phones every year. But Home Office statistics put the number of handsets stolen at 700,000, so we lodged a question about what happens to the other 1.3m handsets, but didn't get a reply in time for publication.

Well - now we know, apparently every year 1.3 million people in the UK report their phone stolen, then find it down the back of the sofa the following day.

There is an alternative explanation of course: the 228-per-hour is based on insurance claims, while 700,000 thefts are recorded by the police. It occurs to us that some people might be claiming for phones without reporting them stolen: perhaps even because they weren't stolen. That's not the kind of crime that tags, PINs or any other technological developments can solve.

They also wouldn't help with "mobile phone identity fraud", which the same promotion told us had "risen by 74% in the first half of 2009". We weren't at all clear what that entailed, except that no-one was dressing up as an iPhone.

We've now been advised that this crime involves people buying phone contracts under false names, thus getting the subsidised handset and not paying the monthly fee.

So it seems that the majority of mobile phone crime involves insurance fraud and people nicking stuff from shops, neither of which is going to be solved by the technology presented, and sponsored, by the HM Government. ®

* Which is, in turn, funded by the Department for Business, Innovation and Skills.

Remote control for virtualized desktops

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Tim Cook: The classic iPod HAD TO DIE, and this is WHY
Apple, er, couldn’t get parts for HDD models
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Microsoft fitness bands slapped on wrists: All YOUR HEALTH DATA are BELONG TO US
Wearable will deliver 'actionable insights for healthier living'
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
Back to the ... drawing board: 'Hoverboard' will disappoint Marty McFly wannabes
Buzzing board (and some future apps) leave a lot to be desired
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.